21 October 2022

Text4Shell vulnerability CVE-2022-42889

Enovation Group and its subsidiaries; Enovation B.V., E.Novation, Enovation Belgium B.V., Verklizan SARL (Enovation France), Verklizan GmbH (Enovation Germany), Verklizan S.L. (Enovation Spain), E.Novation UK Ltd., Multisignaal B.V., CPI B.V. and Funatic B.V. are aware of the Text4Shell vulnerability, first reported on Thursday, 13 October 2022 and escalated on Tuesday, 18 October 2022 by the Dutch National Cyber Security Center (NCSC).

The Enovation Security Office is actively monitoring the status of the vulnerability across all our products and services.

After intensive review and testing we have determined that the vulnerability for Text4Shell (CVE-2022-42889) does not affect our services.

We are monitoring the situation closely and should we find any anomaly we will immediately take the appropriate actions and update this post.
If you have any questions or concerns about this matter, please contact:

More information about the vulnerability is available at www.cve.org

OpenSSL 3 (CVE-2022-3786 & CVE-2022-3602)

After intensive review and testing we have determined that the vulnerability for OpenSSL 3 (CVE-2022-3786 & CVE-2022-3602) does not affect our services.

Enovation and patient portal specialist Funatic continue together Enovation

Enovation strengthens its market position with the acquisition of patient portal and mobile app provider Funatic.

Spring4Shell vulnerability CVE-2022-22965

After intensive review and testing we have determined that the vulnerability for Spring4Shell (CVE-2022-22965) does not affect our services.

Read more news?

Read all news